


default search action
16th ACNS 2018: Leuven, Belgium
- Bart Preneel, Frederik Vercauteren:

Applied Cryptography and Network Security - 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedings. Lecture Notes in Computer Science 10892, Springer 2018, ISBN 978-3-319-93386-3
Cryptographic Protocols
- Benjamin Dowling

, Kenneth G. Paterson:
A Cryptographic Analysis of the WireGuard Protocol. 3-21 - Yotam Harchol, Ittai Abraham, Benny Pinkas:

Distributed SSH Key Management with Proactive RSA Threshold Signatures. 22-43 - Georg Fuchsbauer, Michele Orrù

:
Non-interactive Zaps of Knowledge. 44-62
Side Channel Attacks and Tamper Resistance
- Jean-Sébastien Coron:

Formal Verification of Side-Channel Countermeasures via Elementary Circuit Transformations. 65-82 - Daniel Genkin, Lev Pachmanov, Eran Tromer

, Yuval Yarom
:
Drive-By Key-Extraction Cache Attacks from Portable Code. 83-102 - Estuardo Alpirez Bock, Chris Brzuska, Wil Michiels, Alexander Treff:

On the Ineffectiveness of Internal Encodings - Revisiting the DCA Attack on White-Box Cryptography. 103-120 - Antonio Faonio

, Jesper Buus Nielsen, Mark Simkin, Daniele Venturi:
Continuously Non-malleable Codes with Split-State Refresh. 121-139
Digital Signatures
- Ryan Amiri, Aysajan Abidin

, Petros Wallden
, Erika Andersson
:
Efficient Unconditionally Secure Signatures Using Universal Hashing. 143-162 - Cecilia Boschini

, Jan Camenisch, Gregory Neven:
Floppy-Sized Group Signatures from Lattices. 163-182 - Dario Catalano, Dario Fiore, Luca Nizzardo:

On the Security Notions for Homomorphic Signatures. 183-201 - Marc Fischlin, Patrick Harasser:

Invisible Sanitizable Signatures and Public-Key Encryption are Equivalent. 202-220 - Johannes Blömer, Jan Bobolz:

Delegatable Attribute-Based Anonymous Credentials from Dynamically Malleable Signatures. 221-239
Privacy Preserving Computation
- Irene Giacomelli, Somesh Jha, Marc Joye, C. David Page, Kyonghwan Yoon:

Privacy-Preserving Ridge Regression with only Linearly-Homomorphic Encryption. 243-261 - Sébastien Canard, David Pointcheval, Quentin Santos, Jacques Traoré:

Privacy-Preserving Plaintext-Equality of Low-Entropy Inputs. 262-279 - Andrea Cerulli, Emiliano De Cristofaro, Claudio Soriente:

Nothing Refreshes Like a RePSI: Reactive Private Set Intersection. 280-300
Multi-party Computation
- Geoffroy Couteau

:
New Protocols for Secure Equality Test and Comparison. 303-320 - Peter Sebastian Nordholt, Meilof Veeningen:

Minimising Communication in Honest-Majority MPC by Batchwise Multiplication Verification. 321-339 - Daniel Genkin, S. Dov Gordon, Samuel Ranellucci:

Best of Both Worlds in Secure Computation, with Low Communication Overhead. 340-359 - Stanislaw Jarecki, Boyang Wei:

3PC ORAM with Low Latency, Low Bandwidth, and Fast Batch Retrieval. 360-378
Symmetric Key Primitives
- Ralph Ankele, Florian Böhl, Simon Friedberger:

MergeMAC: A MAC for Authentication with Strict Time Constraints and Limited Bandwidth. 381-399 - Guido Bertoni

, Joan Daemen, Michaël Peeters, Gilles Van Assche, Ronny Van Keer, Benoît Viguier:
KangarooTwelve: Fast Hashing Based on Keccak-p. 400-418
Symmetric Key Cryptanalysis
- Yu Sasaki:

Related-Key Boomerang Attacks on Full ANU Lightweight Block Cipher. 421-439 - F. Betül Durak, Serge Vaudenay:

Generic Round-Function-Recovery Attacks for Feistel Networks over Small Domains. 440-458 - Ralph Ankele, Eik List:

Differential Cryptanalysis of Round-Reduced Sparx-64/128. 459-475 - Serge Vaudenay, Damian Vizár:

Can Caesar Beat Galois? - Robustness of CAESAR Candidates Against Nonce Reusing and High Data Complexity Attacks. 476-494
Public Key Encryption
- Jiangtao Li

, Junqing Gong:
Improved Anonymous Broadcast Encryptions - Tight Security and Shorter Ciphertext. 497-515 - Joseph K. Liu, Tsz Hon Yuen

, Peng Zhang, Kaitai Liang
:
Time-Based Direct Revocable Ciphertext-Policy Attribute-Based Encryption with Short Revocation List. 516-534 - Xavier Boyen, Qinyi Li:

Almost Tight Multi-Instance Multi-Ciphertext Identity-Based Encryption on Lattices. 535-553
Authentication and Biometrics
- Md. Mamunur Rashid Akand

, Reihaneh Safavi-Naini:
In-Region Authentication. 557-578 - Handan Kilinç, Serge Vaudenay:

Formal Analysis of Distance Bounding with Secure Hardware. 579-597 - Ivan Oliveira Nunes, Gene Tsudik:

KRB-CCN: Lightweight Authentication and Access Control for Private Content-Centric Networks. 598-615 - Tyler Kaczmarek, Ercan Ozturk, Gene Tsudik:

Assentication: User De-authentication and Lunchtime Attack Mitigation with Seated Posture Biometric. 616-633
Cloud and Peer-to-Peer Security
- Christian Cachin, Esha Ghosh, Dimitrios Papadopoulos, Björn Tackmann:

Stateful Multi-client Verifiable Computation. 637-656 - Shruti Tople, Soyeon Park, Min Suk Kang, Prateek Saxena:

VeriCount: Verifiable Resource Accounting Using Hardware and Software Isolation. 657-677 - Suyash Kandele

, Souradyuti Paul
:
Message-Locked Encryption with File Update. 678-695 - Seny Kamara, Alptekin Küpçü

:
DogFish: Decentralized Optimistic Game-theoretic FIle SHaring. 696-714

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














